
The
access type
is controlled by the following options:
r
Read
w
Write
x
Execute—executing files or changing to the directory
s
Setuid bit—the application or program is started as if it were started by the
owner of the file
As an alternative, a numeric code can be used. The four digits of this code are
composed of the sum of the values 4, 2, and 1—the decimal result of a binary mask.
The first digit sets the set user ID (SUID) (4), the set group ID (2), and the sticky
(1) bits. The second digit defines the permissions of the owner of the file. The third
digit defines the permissions of the group members and the last digit sets the per-
missions for all other users. The read permission is set with 4, the write permission
with 2, and the permission for executing a file is set with 1. The owner of a file
would usually receive a 6 or a 7 for executable files.
gzip [parameters] files
This program compresses the contents of files using complex mathematical algo-
rithms. Files compressed in this way are given the extension
.gz
and need to be
uncompressed before they can be used. To compress several files or even entire
directories, use the
tar
command.
-d
Decompresses the packed gzip files so they return to their original size and
can be processed normally (like the command
gunzip
)
tar options archive files
tar
puts one or more files into an archive. Compression is optional.
tar
is a quite
complex command with a number of options available. The most frequently used
options are:
-f
Writes the output to a file and not to the screen as is usually the case
350
Installation and Administration
Summary of Contents for LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 11-05-2007
Page 1: ...SUSE Linux Enterprise Server www novell com 10 May 11 2007 Installation and Administration...
Page 14: ......
Page 19: ...Part I Deployment...
Page 20: ......
Page 60: ......
Page 128: ......
Page 243: ...Part II Administration...
Page 244: ......
Page 274: ......
Page 312: ......
Page 348: ......
Page 380: ......
Page 381: ...Part III System...
Page 382: ......
Page 438: ......
Page 452: ......
Page 478: ......
Page 486: ......
Page 498: ......
Page 512: ......
Page 558: ......
Page 559: ...Part IV Services...
Page 560: ......
Page 652: ......
Page 670: ......
Page 742: ......
Page 754: ......
Page 796: ......
Page 817: ...Part V Security...
Page 818: ......
Page 858: ......
Page 886: ......
Page 910: ......
Page 911: ...Part VI Troubleshooting...
Page 912: ......
Page 924: ......